Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50...

18
Publisher The Goodheart-Willcox Company, Inc. Tinley Park, Illinois www.g-w.com

Transcript of Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50...

Page 1: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

Publisher

The Goodheart-Willcox Company, Inc.

Tinley Park, Illinois

www.g-w.com

Page 2: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

#

Chapter 1

Introduction to Networking 25

Definition of a Network 27

Advantages of Networking 28

Disadvantages of Networking 29

Network Classifications—LAN, MAN, and WAN 29

Network Topologies 30

Bus Topology 31

Star Topology 32

Ring Topology 32

Mesh Topology 33

Wireless Topology 34

Hybrid Topology 35

Basic Administration Network Models 36

Client/Server Network 37

Peer-to-Peer Network 38

Network Operating Systems (NOS) 39

Network Communications 40

How Data Is Packaged 40

Network Connectivity 40

Protocols 41

TCP/IP 42

FIR 43

ATM 43

LLDP 43

NetBIOS and NetBEUI 45

Network Media and Devices 46

Media 46

Media Converter 46

Network Interface Card 46

8

Page 3: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

Table of Contents 9

Repeater 48

Hub 48

Gateway 48

Bridge 49

Switch 50

Multilayer Switch 51

Router 51

Brouter 52

Standards and Organizations 52

IEEE 53

ISO 54

W3C 54

CERN 55

UL 55

EIA 55

TIA 55

ANSI 55

OSI Model 55

Physical Layer 56

Data Link Layer 56

Network Layer 56

Transport Layer 57

Session Layer 57

Presentation Layer 57

Application Layer 57

OSI Model and Network Devices 57

Laboratory Activity—Identifying a Workstation's IP ConfigurationSettings 63

Chapter 2iiiiiinNetwork Media—Copper Core Cable 67

Network Media 69 WfRBKRKBR^RRtBAnalog and Digital Signals 69 HHHHBBHH

Frequency 70 BBBBBBBBfAttenuation 71 T^l^wHMMipBpInterference 71

ff- '"^L'^-^^BLatency 72 HHHHBflHHH

Data Transmission 73 ""'v* "^P^ipiBandwidth 73 |pBBMpBB|pBaseband 73 HHHHHHflHBroadband 74 HHHHHISimplex, Full-Duplex, and Half-Duplex Communication 75

Electronic Terms 76

Direct Current and Alternating Current 76

Page 4: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

10 Networking Fundamentals

Resistance and Impedance •-76

Reflected Loss 76

Crosstalk 76

Copper Core Cables 79

Coaxial Cable 81

TwistedPair 84

IEEE 802.3 Standard 88

IEEE 802.3 Classifications 88

IEEE 802.3 Media Access 95

IEEE 802.3 Wiring and Connections 95

IEEE 802.5 Standard 100

Wiring Faults 102

Short 102

Open 102

Ground 103

Reversed, Crossed, and Split Pairs 104

Laboratory Activity—Making a Cat 6 Straight-Through Patch Cable Ill

Chapter 3iiiniii

Fiber-Optic Cable ...119

Characteristics of Fiber-Optic Cable 120

Security 121

Immunity to Electromagnetic Interference 121

Weight and Size 122

Safety 122

Bandwidth 122

Corrosion and Water Resistance 122

Greater Distances 122

The Nature of Light 123

Fiber-Optic Cable Construction 124

Fiber-Optic Cable Transmission Characteristics 125

Attenuation 125

Fiber-Optic Cable Specifications 128

IEEE 802.3 Standards 129

Gigabit Ethernet 130

10 Gigabit Ethernet 130

lOGBaseW 131

Fiber Distributed Data Interface (FDDI) 132

Fiber-Optic Cable Connectors 134

Fiber-Optic Cable Installation and Troubleshooting 134

Installing Connectors 135

Making a Fusion Splice 135

Using Fiber-Optic Cable Meters 137

Laboratory Activity—Fiber-Optic Connector Identification 145

Page 5: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

Table of Contents 11

Chapter 4

Wireless Technology 147

Electromagnetic Waves 149

Radio and Microwave Transmission 149

Infrared Transmission 151

Radio Interference 152

Antenna Styles 154

Omni 154

Dipole 155

Yagi 155

Flat Panel 156

Parabolic 156

Radio Wave Transmission Techniques and Networking 157

Radio Wave-Based Transmission Techniques 157

Radio Wave-Based Networking 160

Wireless Access Points 160

Wireless Network Modes 162

IEEE 802.11 Standard 163

802.11 Access Method 166

New IEEE Wireless Standards 170

USB Wireless 172

Bluetooth 172

Cellular Technology 173

Microwave Transmission and Networking 174

Infrared Transmission and Networking 176

Advantages and Disadvantages of Wireless Technology 176

Wireless Security 176

802.1X Authentication 177

802.1X Encryption 178

Wi-Fi Protected Access 181

Laboratory Activity—Installing a USB Network Adapter and

Configuring a Wireless Router 187

Chapter Siiiiini

Digital Encoding and Data Transmission 199

Digital Signals and Digital Encoding 200

Data Packaging and Transmission 203

Parity Checks 203

Cyclic Redundancy Check (CRC) 204

Segmentation and Encapsulation 204

Connection-Oriented and Connectionless Communication 206

Circuit Switching/Packet Switching 207

Data Codes 208

ASCII 208

ffl*»a-

VM^y^i^&t^iSS^^S

B»-

*~

Page 6: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

12 Networking Fundamentals

BCD 210

EBCDIC 210

Unicode 210

HTML 211

Protocol Frame Structures 212

UDP Frame Structure 214

Ethernet Frame Structure 215

Data Encoding, Transmission, and the OSI Model 217

Application Layer 218

Presentation Layer 218

Session Layer 218

Transport Layer 219

Network Layer 219

Data Link Layer 221

Physical Layer 221

Laboratory Activity—Introduction to Wireshark 227

HofiwAii)^

Cwmtf m*ij.

: ijjf V^IK^-2Q^>h»rtCi>nwMn

*ta Miwuam t* (urn

Sal

61 ^CMfct Moth*

H Mv*ulKH*~t*nvO*t*MMlMTttMitMJt,H S*** Mmri IW"Bta

Vi *.H*r*Piele«4V»vnfrTCMPTS)H ^hMH>nMM<slVn«>([lC^<)

K L.ltk\tftt Tspatcjy tatmrj Mhk Cnkm

ii >•'Irttiiy.. TafKfajf pnarfj knpcntv

tZjSSa^ !';"---^.

J L.j'*?^CtM«>Mn

C_aC][.fS

w*l^^^^^^^^s^f-S^jj^i

Chapter 611111111

Network Operating Systems and

Network Communications 237

The Evolution of Network Protocols 238

Common Network Operating System Traits 239

Network Operating Systems and Hardware Protocols 242

Ethernet 244

Token Ring 247

Token Bus 249

ARCnet 249

AppleTalk 250

Network Operating Systems and Networking Protocols 250

TCP/IP 252

NetBIOS 254

NetBEUI 256

IPX/SPX 257

AppleTalk 258

Discovery Protocols 259

Laboratory Activity—Using the ARP Command 267

Chapter 7

Microsoft Network Operating Systems 271

A Brief History of Microsoft Network Operating Systems 273

Windows Server 2008 275

Windows Server 2008 Editions 275

Windows Server 2008 Features 277

Small Business Server 2008 280

Page 7: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

Table of Contents 13

CommonWindows Server Administrative Components 280

Domain, Workgroup, and HomeGroup Membership 281

User Account 282

Group Account 282

Security Policy 283

Network Share 283

File Sharing Protocols 285

Disk Management 286

New Technology File System 286

Share- and User-Level Permissions 288

Administrative Tools 291

Active Directory Domain Services 292

Active Directory Structure 293

Common Name 298

Authentication 298

AD Replication 299

Trusts Relationships 300

Windows Server Administration 302

Microsoft Management Console 302

Managing Local Users and Groups 302

Managing Domain Users and Groups 305

Windows Disk Management 307

POSIX 310

Network Interoperability 310

Laboratory Activity—Adding Users to Windows Server 2008 315

Chapter 8iiiuiiiUNIX/Linux Operating Systems 323

UNIX 325

Linux 326

Linux Advantages 328

Linux Disadvantages 328

Copyright and Copyleft 328

UNIX/Linux Basics 330

LILO and GRUB 330

Shells 330

Commands 332

File Systems 334

File Structure 335

Common Files and Directories 336

File and Directory Security 337

Network Authentication 339

File and Print Sharing 339

Remote Access Features 339

Page 8: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

14 Networking Fundamentals

X Windows System 341

Interoperability 344

Samba 344

NFS 346

Troubleshooting interperability 349

Mac OS X Server 350

Laboratory Activity—Installing openSUSE 11 Linux 355

Chapter 9iiiiiin

Introduction to the Server 369

^l^l^^lllS^Server Classification by Number of CPUs 372

Major Server Components 372

Small Computer Systems Interface (SCSI) 377

SCSI ID numbers 378

Logical unit number (LUN) 379

Serial Attached SCSI 379

ACPI and ACPICA 380

System Resources 381

Interrupt Request (IRQ) 381

Direct Memory Access (DMA) Channel 382

Input/Output (I/O) Port 383

Memory Address Assignment 384

RAID Systems 384

RAID 0 386

RAID 1 386

RAID 2 387

RAID 3 387

RAID 4 387

RAIDS 387

RAID 0/1 388

RAID 0/5 388

RAID 6 388

External Storage Systems 388

Network-Attached Storage (NAS) 388

Storage Area Network (SAN) 388

Fibre Channel 390

Fibre Channel Point-to-Point Topology 390

Fibre Channel Arbitrated Loop Topology 390

Fibre Channel Fabric Switched Topology 391

Internet Small Computer Systems Interface 391

Furthering Your Study 393

Laboratory Activity—Using the DiskPart Command Interpreter 399

Page 9: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

Table of Contents 15

Chapter 10

TCP/IP Fundamentals 403

IPv4 Addressing 405

Network Class 406

Subnet Mask 407

Reserved IPv4 Addresses 407

Viewing IP Configuration Settings 409

Domain Name System (DNS) 410

Internet Corporation for Assigned Names and Numbers (ICANN) —411

Fully Qualified DomainName (FQDN) 411

DNS Structure and Operation 412

Hosts and Lmhosts Text Files 415

IP, TCP, and UDP Protocols 416

Relationship to the OSI Model 416

Frame Formats 417

Assigning IP Addresses 419

Windows Internet Naming Service (WINS) 419

Dynamic Host Configuration Protocol (DHCP) 420

DHCP Lease 422

Automatic Private IP Addressing (APIPA) 422

Bootstrap Protocol (BOOTP) 423

Duplicate IPv4 Addresses 423

TCP/IP Ports and Sockets 424

Introducing the IPv6 Standard 425

Advantages of IPv6 426

IPv6 Address Format 427

IPv6 EUI-64 Identifier 427

IPv6 Topography Terminology 429

Types of IPv6 Addresses 431

Unicast Addresses 431

IPv6 Loopback Address 433

IPv6 Unspecified Address 433

Local-Use Address Zone IDs 433

IPv6 Prefixes 433

IPv6 Transition Technologies 434

6to4 435

ISATAP 435

Teredo 435

Broadcast and Multicast Addresses 436

IPv6 Lifetimes 436

Windows XP and IPv6 436

Disabling IPv6 437

TCP/IP Troubleshooting Utilities 437

Netstat 437

Page 10: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

16 Networking Fundamentals

-S^*y&Mis£i&itL

MP SubnetOicubtor

itSHrm .'tr'u-.t,

iwwwr |WWUn***l M1

**»,,

lllMHMit

$^&^V-T**~^

TwU,^:"

ilEWsili l^ifiSW^i j-

HM.«W"Itt)vCO~MOwKnM4wiMlt•Wflwiili fnW

CsCK

Nbtstat 438

Ping 439

Tracert or Traceroute 440

ARP 440

Nslookup 441

Laboratory Activity—Configuring a Static IPv6 Address 447

Chapter 11

Subnetting 451

The Binary Number System 453

Dotted Decimal Notation 453

Subnetting 454

A Closer Look at Subnets 458

Advantages of Subnetting 459

Disadvantages of Subnetting 460

Network Segmenting Devices 460

Bridge 460

Switch 461

Router 464

Virtual LAN 469

Static vs. Dynamic VLAN 471

VLAN Trunking 471

Spanning Tree Protocol 473

Classless Inter-Domain Routing 474

Link Aggregation 476

Laboratory Activity—Subnet Mask Calculator 481

Chapter 12

Multimedia Transmission 487

Voice and Audio Signals 489

Signal Conversion 489

Jitter 492

Latency 493

Acoustical Echo 494

Video 495

Video Resolution 495

Compression 495

Multimedia Transmission Protocols 497

X.25. .497

Frame Relay 498

ATM 498

.504VoIP

Telephone Gateway and H.323 507

Quality of Service (QoS) 507

Page 11: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

Table of Contents 17

Session Initiation Protocol (SIP)Real-Time Transport Protocol (RTP)

Basic VoIP Troubleshooting

Using a Protocol Analyzer to Verify Packet ExchangeVoIP JitterFirewall Blocking VoIP Packets

Audio Device Configuration

Impedance Mismatch

Laboratory Activity—Windows Meeting Space

Chapter 13

Web Servers and Services

Internet, Intranet, and Extranet

Internet

Intranet

Extranet

Domain Name and URL Resolution

Web Servers

Apache HTTP Server 531

Internet Information Services (IIS) 532

Web Browsers 533

Search Engines 533

Web Site Communications 535

HTML 535

SGML 536

XML 536

CSS 536

JavaScript 537

SOAP 538

FrontPage Extensions 538

File Transfer Protocol (FTP) 538

Anonymous FTP Site 540

Network News Transfer Protocol (NNTP) 540

E-Mail 542

SMTP 542

Post Office Protocol (POP) 544

Internet Message Access Protocol (IMAP) 544

HTTP E-Mail 544

Multipurpose Internet Mail Extensions (MIME) 545

E-Mail Address Format 545

E-Mail Structure 546

Mail Filter 546

Mail Gateway 548

Laboratory Activity—Installing Internet Information Services (IIS) 553

..508

..509

..509

..510

..510

..511

..511

..513

..517

525

..526

.

.526

.

.527

.

.527

.

.527

..529

f;

mWirntowj(«IuiHO(

:ia WuchiW«m»»BS»r-HtiHtnriM*ftbt*n

i itk titomeft Jit! illMtrrt* }>i

i tJii t-SfretpIlMnwJ<CMV«limO) "rrn*t

b Mil Print ml OhumM Imkii

:'_,}. WKowfWwMinij«»Art>nqUti»*«eCMAM

CjsQ CesiD

Page 12: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

18 Networking Fundamentals

A lECt B0,1**ilhttifa4Mn CMftM6p6tiMonpMlMJJJ^ p*M[ril^nBtinD^MtnMlw«rkikiinlichd*U

cncqpttwiidubM,

| QK )1 C*nc«t |

Chapter 14

Remote Access and Long-Distance Communications... 561

Introduction to Telecommunications Systems 562

Remote Connection Technologies and Media 564

Public Switched Telephone Network (PSTN) 565

ISDN 565

Cable Internet Service 566

Digital Subscriber Line (DSL) 568

Satellite 569

T-Carrier 571

FDDI 572

SONET 572

X.25 573

Frame Relay 573

Dial-Up Networking 574

Dial-In Only 575

Dial-Out Only 576

Full Service 576

Remote Desktop Protocol (RDP) 576

Remote Access Protocols 577

Virtual Private Networks (VPN) 581

Laboratory Activity—Routing and Remote Access Service (RRAS) 587

Chapter 15

Network Security 597

Hackers, Crackers, and Intruders 599

CommonNetwork Security Breaches 599

Unprotected Network Shares 600

Social Engineering 600

Open Ports 600

Zero Configuration (Zeroconf) 601

Denial of Service (DoS) 601

Man in the Middle (MITM) 601

Spoofing 602

Smurf Attack 602

Trojan Horse 603

E-mail Attachments 603

Macro Virus 603

Worm 603

Phishing 604

Administrator Laziness 605

Intrusion Detection and Intrusion Prevention Systems 605

Security Methods and Protocols 606

Page 13: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

Table of Contents 19

Public Key Infrastructure (PKI) 606

Certificate Authority (CA) 608

Security Sockets Layer (SSL) 610

Transport Layer Security (TLS) 610

Secure HTTP 611

Virtual Network Connection (VNC) 611

Independent Computer Architecture (ICA) 611

Internet Protocol Security (IPSec) 611

Secure Shell (SSH) 612

Secure Copy Protocol (SCP) 613

Wireless Security 613

Wireless Access Point Authentication 613

Media Access Control (MAC) Filter 614

Wired Equivalency Privacy (WEP) 614

Wi-Fi Protected Access (WPA) 614

Wi-Fi Protected Access 2 (WPA2) 614

802.11i 614

802.1x Authentication 615

Rogue Wireless Access Points 617

Authentication, Authorization, and Accounting 618

RADIUS 619

Diameter 619

TACACS+ 620

Authentication Protocols 621

Password Authentication Protocol (PAP) 621

Challenge Handshake Authentication Protocol (CHAP) 621

Kerberos 622

Extensible Authentication Protocol (EAP) 623

Wi-Fi Protected Access (WPA) 623

Security Implementations 623

Software Installation Patches 624

Administrator Account 624

User Account Passwords 625

Other Password Security Measures 627

Firewall 627

Proxy Server 631

Securing Remote Access 631

Physical Security 632

Security Tools 633

Netstat Utility 634

Audit Tools 634

Self-Hack Tools 635

Protocol Analyzer 635

Packet Sniffer 636

Page 14: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

20 Networking Fundamentals

System Backups 637

Data Security Compliance Requirements 637

Health Insurance Portability and Accountability Act 638

Payment Card Industry Data Security Standard 638

California SB 1386 638

Sarbanes-Oxley 639

Laboratory Activity—Security Event Monitoring 644

Chapter 16

A Closer Look at the OSI Model 649

pSS^i History and Purpose of the OSI Model 650

Application Layer 654

fi£.„T..,„ Presentation Layer 654

imawiwrn Session Layer 655k^=to—_:—=—

Transport Layer 656

Network Layer 657

Data Link Layer 659

Physical Layer 660

The Encapsulation Process 661

The OSI Model and the Major Protocol Suites 663

TCP/IP Protocols 663

Novell IPX/SPX Protocols 663

AppleTalk Protocols 665

AppleShare IP Protocols 666

Request For Comments (RFC) 666

Laboratory Activity—Wireshark OSI Model Exploration 671

Chapter 17

Maintaining the Network 675ST— —_ q Monitoring the Server and Network 677

I 111MM Establishing a Baseline 677

L :r EE" "

:, Monitoring Tools 681~ ~

nsr"~ , v n.,,°

!|ss | I Maintaining System Software 686

—•'

Patches 686B~,, ....

: ij

Service Packs 686

Upgrades 686

Software Installations 687

Maintaining System Hardware 688

Scheduling Downtime 690

Major Network Hardware Upgrades 690

Maintaining System Integrity 691

Fault Tolerant RAID Systems 691

Backup Data Methods 692

Page 15: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

Table of Contents 21

Hot and Cold Spares 694

Hot, Cold, and Warm Sites 695

Maintaining Stable Electrical Power 696

Electrical Surges and Spikes 696

Brownouts and Blackouts 697

Uninterruptible Power Supply (UPS) 698

Isolation Transformers 700

Generators 701

Protecting Networks from Malware 701

Establishing Network System User Policies 701

Antivirus Software 702

Malware 703

Merging Networks 706

Laboratory Activity—LANguard Network Security Scanner 713

Chapter 18

Fundamentals of Troubleshooting the Network 719

CompTIA Network+ Troubleshooting Methodology 720

1. Information Gathering—Identify Symptoms and Problems 721

2. Identify the Affected Areas of the Network 722

3. Determine if Anything Has Changed 724

4. Establish the Most Probable Cause 724

5. Determine if Escalation Is Necessary 725

6. Create an Action Plan and Solution Identifying Potential Effects...

.726

7. Implement and Test the Solution 726

8. Identify the Results and Effects of the Solution 726

9. Document the Solution and the Entire Process 727

Stages of Computer Operation 728

During the POST 729

Loading and Initializing the Operating System 729

After a Successful Logon 729

Detailed Computer Startup Process 730

1. Power-On Self-Test (POST) 730

2. Initial Startup 732

3. Boot Loader Phase (Windows 2000/XP/Server 2003) 732

4. Detect and Configure Hardware (Windows 2000/XP/Server 2003)... .733

3. Windows Boot Manager (Windows Vista/7/Server 2008) 733

4. Windows Boot Loader (Windows Vista/7/Server 2008) 733

5. Kernel Loading Phase 733

6. Logon Phase 734

Windows NT-Based Troubleshooting Tools 734

System Recovery Strategies and Methods 740

Windows Installation Disc 741

Windows Backup and Restore 743

£ U<«*raQIEF>n#Ciq«l*

WfflfYwi

DgM&rvW>W*f

Tsstwddrii <tal*•*Kn

l**MOwr ~j TturfMtm

"FWi*Qwi~t*kMhiimtou<*i!nuk?d*!

ZZ\ iMitinvV^vu^

CS3uaaj

Page 16: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

22 Networking Fundamentals

Windows XP Automated System Recovery (ASR) 743

OEM and Repair Shop Disc Image 744

Troubleshooting Dual-Boot Systems 744

Server Data Integrity and Performance 746

Troubleshooting the Network Infrastructure 746

Windows XP Network Diagnostic Utility 747

Network and Sharing Center 748

Network Cable Tester 750

Tone Generator and Tracer 751

Fiber-Optic Cables 751

NIC Loopback Test 751

Indicator Lights 752

Network Analyzer 752

Protocol Analyzer 752

Wireless Network Tester/Analyzer 753

Troubleshooting the MostCommon Network Problems 753

Cannot LogOn to the Network/Computer 754

Loose or No Connection 755

Cannot Access a Share 756

Cannot Print to Network Printer 756

Printer Is Printing Gibberish 756

Computer Has a Virus or Worm 757

Cannot Obtain a Proper IPv4 Address 757

Cannot Connect to an Application Server 757

Cannot Access VoIP Services 758

Duplex Mismatch 758

Cannot Access the Internet 758

Troubleshooting Common Wireless Problems 759

ESSID Mismatch 760

Signal Bounce 760

Encryption Enabled 760

Troubleshooting with TCP/IP Utilities 760

Ping 760

Pathping 761

Tracert 762

Netstat 764

Nbtstat 765

ARP 767

IPconfig 767

Nsiookup 767

Route 768

Net 768

Laboratory Activity—Using the Netstat Command 776

Page 17: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

Table of Contents 23

Chapter 19

Designing and Installing a New Network 781Needs Assessment and Design 783

Physical Network Structure 784

Security 784

Application 784

Organizational Structure 785

Fault Tolerance and Data Integrity 790

Network Design Tools 791

Developing a Timeline 794

Installation 795

Implementation 795

Documentation 796

Training 796

Specifications for Network Design 796

Architectural Design Elements 797

Standards Organizations 804

ANSI/TIA/EIA Standards 804

Network and Computer Electrical Requirements 807

BICSI 810

Laboratory Activity—Designing a Small Network 815

Chapter20

Network* Certification Exam Preparation 819

The Network+ Certification Exam 820

Preparation Strategy 822

1. Review and Analyze the Exam Objectives 823

2. Match Exam Objective Details to Resource Material 823

3. Identify and Practice Laboratory Activities That Match theExam Objectives 825

4. Take Practice Exams 825

5. Review Problem Areas 825

6. Retake Practice Exams 826

7. Schedule and Take the Network+ Certification Exam 826

Networks- Certification Practice Exam 826

Domain 1.0—Network Technologies 826

Domain 1.0—Practice Exam Questions 1-20 827

Domain 2.0—Network Media and Topologies 829

Domain 2.0—Practice Exam Questions 21-40 830

Domain 3.0—Network Devices 832

Domain 3.0—Practice Exam Questions 41-57 832

Domain 4.0—Network Management 834

Domain 4.0—Practice Exam Questions 58-78 835

Domain 5.0—Network Tools 838

-Z. _

.

-mmmmmmmm^

I-

£)Ntnrintt»kM ;

1DN«» UiMtMH »% HI

UMrtwnllxfe 11tv It

&aNrtiral$rturtv |!T. 11

T<rt,l IUH lf»

Page 18: Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50 Multilayer Switch 51 Router 51 Brouter 52 StandardsandOrganizations 52 IEEE 53 ISO

24 Networking Fundamentals

Domain 5.0—Practice Exam Questions 79-89 838

Domain 6.0—Network Security 840

Domain 6.0—Practice Exam Questions 90-100 840

Scoring the Exam 842

Chapter 21

Employment in the Field of Networking Technology 845

Information Technology Industry Careers 847

Network Support Specialist 848

Network Administrator 849

Systems Analyst 849

Consultant 849

Technical Salesperson 849

Web Administrator 850

Programmer 850

Engineer 851

Entrepreneur 851

Career Information Sources 851

General and College Education 853

Certification 854

CompTIA Certifications 854

Microsoft Certifications 856

Novell Certifications 857

Cisco Certifications and Training 858

LPIC 859

Other Certifications 859

Employment 860

Job Search Ideas 861

Preparing a Resume 861

Preparing for the Interview 862

Personal Appearance at the Interview 863

Information to Bring to an Interview 863

The Job Interview 864

Testing at the Interview 865

Appendix A—List of Networking Acronyms 867

Appendix B—Binary Math 873

Appendix C—Number Conversion Table 877

Appendix D—Table of ASCII Characters 879

Appendix E—Protocol Family Encapsulations 881

Glossary 883

Index 909